Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Generating Dynamic Password Using Static Password as Source

A technology of dynamic password and static password, applied in the direction of encryption device with shift register/memory, etc., can solve the problems of static password theft, easy to be stolen, and cracked by special algorithm for dynamic verification code, so as to reduce the number of stolen passwords. , the effect of improving safety

Inactive Publication Date: 2016-08-17
周灿旭
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Easy to be stolen: Since the input of the static password is directly typed by the user on the keyboard by pressing the corresponding number or letter, the third person can obtain the password only by recording or watching the input process of the password, and the password can be obtained by viewing it once. It is possible to steal all the information of the password, therefore, the static password is easy to be stolen by others at once
[0008] First, the dynamic verification code requires additional equipment to receive or generate it, and there is a risk that the dynamic verification code will be intercepted or the special algorithm for generating the dynamic verification code will be cracked;
[0009] Second, the user's static password is separate from the existing dynamic password and needs to be entered into the client together with the dynamic verification code, which cannot achieve the purpose of protecting the user's original static password from being peeped by others. To add a layer of protection for identity verification, the risk of static passwords being stolen has not been reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Generating Dynamic Password Using Static Password as Source
  • A Method of Generating Dynamic Password Using Static Password as Source
  • A Method of Generating Dynamic Password Using Static Password as Source

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 and Figure 4 As shown, the method for generating a dynamic password using a static password as a source in Embodiment 1 of the present invention includes the following steps:

[0047] (S1) The server stores the static password and index code preset by the user;

[0048] (S2) Every time the server receives a password input request sent by the user through the user terminal, it randomly generates an intermediate password mapping relationship set, and the index code is used as one of the password mapping relationships in the intermediate password mapping relationship set to select The base point is used to designate one of the intermediate password mapping relationship sets as the intermediate password used for the current password input, and then generate a dynamic password through the dynamic password mapping relationship between the intermediate password and the input keyboard; and, the server randomly generates The password mapping relationship set ...

Embodiment 2

[0066] The method for generating a dynamic password using a static password as a source in Embodiment 2 of the present invention is basically the same as Embodiment 1, and their difference lies in that in Embodiment 2, it is not necessary to use the index code to calculate the positioning reference bar through a specific calculation rule. Instead, use the index code +1 as the first mapping mark of the static password on the positioning reference bar. At this time, the index code is any natural value. Of course, you can also directly use the value of the index code as the static code. The first bit of the password on the positioning reference bar is mapped to the marker bit, but at this time the index code should be preset to any natural value other than 0, and this method will not be described for example.

[0067] The following is an example to illustrate the specific operation steps for the user to use the index code to obtain the dynamic password through the password mapping...

Embodiment 3

[0074] The method for generating a dynamic password from a static password in Embodiment 3 of the present invention is basically the same as Embodiment 1, and their difference lies in that the input keyboard in Embodiment 3 includes ten keyboard grids. In addition, the input keyboard can also include eleven or more keyboard grids, and English characters are added as the numbers of the keyboard grids. The implementation principle is the same as that of the third embodiment, and will not be repeated here.

[0075] In the following, an example is used to illustrate the specific operation steps for the user to use the index code to obtain the dynamic password through the password mapping relationship set displayed on the operation interface of the user terminal in the third step (S3) of this embodiment:

[0076] Such as Figure 9 As shown, when the server receives the password input request sent by the user through the client, the password mapping relationship set is randomly gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for generating a dynamic password using a static password as a source, comprising: S1 server storing static passwords and index codes; S2 server randomly generating intermediate passwords each time receiving a password input request from a user terminal The mapping relationship set, the index code is used to specify one of the intermediate password mapping relationship sets as the intermediate password used for the current password input, and then generate a dynamic password through the dynamic password mapping relationship between the intermediate password and the input keyboard; S3 server side Display the intermediate password mapping relationship set on the user interface to prompt the user to use the index code to find the intermediate password, and then use the dynamic password mapping relationship between the intermediate password and the input keyboard to obtain the dynamic password; The dynamic password is sent to the server, and the server verifies whether the dynamic password input by the user is consistent with the dynamic password obtained in step S2. The invention can improve the protection of the static password.

Description

technical field [0001] The invention relates to a dynamic password method, in particular to a method for generating a dynamic password from a static password. Background technique [0002] At present, the password input method in many fields such as finance and the Internet still uses static password as the main identity verification method, and static password input is used as identity verification alone, which has the following defects: [0003] 1. Easy to be stolen: Since the input of the static password is directly typed by the user on the keyboard by pressing the corresponding number or letter, the third person can obtain the password only by recording or watching the input process of the password, and the password can be obtained by viewing it once. It is possible to steal all the information of the password, therefore, the static password is easy to be stolen by others all at once. [0004] 2. Easier to be deciphered: Even if you can only observe the process of enter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06
Inventor 周灿旭
Owner 周灿旭
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products